期刊文献+

图像垂直验证码的可用性及展望

Availability and Prospect of Image Vertical Verification Code
下载PDF
导出
摘要 验证码是一种广泛应用于互联网领域的安全技术。笔者着重讨论一种基于图像方向识别的验证方式——图像垂直验证。该方式通过利用自动定位检测系统、社会反馈机制等技术手段,在提高可识别度、不影响准确率的前提下,大大提升了验证码的防破解能力。图像垂直验证技术的优势在于拥有海量的图像素材,不需要进行文本输入,与传统的文本识别验证方式相比,有利于快速通过验证,使用户获得更好的体验。 Verification code is a kind of security technology widely used in the field of Internet.This paper focuses on a verification method based on image direction recognition-image vertical verification.By using the technology of automatic location detection system,social feedback mechanism and so on,this method greatly improves the anti cracking ability of the verification code on the premise of improving the recognizability and not affecting the accuracy.The advantage of image vertical verification technology is that it has a large number of image materials and does not need text input.Compared with the traditional text recognition verification method,it is conducive to pass the verification quic kly and make users get a better experience.
作者 马睿 Ma Rui(College of Data Science,Taiyuan University of Technology,Taiyuan Shanxi 030024,China)
出处 《信息与电脑》 2020年第5期8-9,共2页 Information & Computer
关键词 身份验证 自动攻击 图像处理 方向检测 identity verification automatic attack image processing direction detection
  • 相关文献

参考文献1

二级参考文献8

  • 1王立新,刘彤宇,李阳.SSDA图像匹配算法的研究及实现[J].光电技术应用,2005,20(3):53-55. 被引量:37
  • 2汪涛,卢朝阳.一种新的汽车牌照字符切分算法[J].西安电子科技大学学报,2005,32(6):931-934. 被引量:8
  • 3Von Ahn L, Blum M, Langford J. Telling Humans and Computer Apart Automatically [J] . Communication of ACM, 2004, 47(2): 57-60.
  • 4Mori G, Malik J. Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCH [C]//IEEE Conference on Computer Vision and Pattern Recognition. Washington: IEEE Computer Society, 2003: 134-141.
  • 5Moy G, Jones N, Harkless C, et al. Distortion Estimation Techniques in Solving Visual CAPTCHAs [C]//IEEE Conference on Computer Vision and Pattern Recognition. Washington: IEEE Computer Society, 2004: 1-6.
  • 6Yan J, Ahmad A S E. A Low-cost Attack on a Microsoft CAPTCHA[C]//Proc of the ACM Conference of Computer and Communications Security. New York: ACM Press, 2008: 543-554.
  • 7Chellapilla K, Simard P. Using Machine Learning to Break Visual Human Interaction Proofs [C] //Neural Information Processing Systems (NIPS). Cambridge: MIT Press, 2004': 265-272.
  • 8Bursztein E, Martin M, Mitchell J C. Text-based CAPTCHA Strengths and Weaknesses [C]//Proc of the ACM Conference of Computer and Communications Security. Chicago : ACM Press, 2011 : 125-137.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部